姓名:高星 职称:博士生导师 联系电话: 办公地址:经管楼B405室 个人主页: 邮箱:emgx@seu.edu.cn 教育背景管理学博士,系主任,博士生导师 学术兼职中国管理科学与工程学会协同创新与管理研究会常务理事 中国系统工程学会青年工作委员会委员 中国信息系统协会理事 研究领域电子商务与人工智能 新兴技术管理 技术创新管理 供应链管理 研究课题国家自然科学基金项目:信息系统安全利益相关者之间的博弈关系分析和激励策略研究,主持 江苏高校哲学社会科学研究重大项目:黑客地下产业链的运行机理及治理机制研究,主持 国家重点研发计划课题:不同主题示范区可持续发展动态演化态势及其驱动机制,参与 奖励与荣誉入选东南大学至善青年学者资助计划(A类) 学术成果第一作者 [1] A duopolistic analysis of CEO competitive aggressiveness with R&D investment. Production and Operations Management, 2024. (UTD 24 Journals) [2] Competition between proprietary and open source vendors with security concerns. Technology Analysis & Strategic Management, 2024, 36(3):592-604. [3] Information security outsourcing in a resource-sharing environment: the impacts of attack modes. Journal of the Operational Research Society, 2023. [4] Information sharing and security investment for substitutable firms: A game-theoretic analysis. Journal of the Operational Research Society, 2023. [5] Information security investment with budget constraint and security information sharing in resource-sharing environments. Journal of the Operational Research Society, 2023. [6] Competitive analysis of R&D investment with R&D budget constraint and R&D uncertainty. Managerial and Decision Economics, 2023, 44 (4): 2438-2456. [7] Information security investment for complementary and substitutable firms: The role of technology similarity. Expert Systems with Applications, 2023, 225: 120129. [8] A competitive analysis of information security investment: The role of hacker attacks. Journal of Industrial and Management Optimization, 2023, 19(8): 6104-6129. [9] R&D subsidy and output subsidy in a duopoly: the role of technology spillover and R&D budget. Australian Economic Papers, 2023, 62(3): 524-538. [10] A competitive analysis of software quality investment with technology diversification and security concern. Electronic Commerce Research, 2023, 23: 2691-2712. [11] Competitive information security investment under hacker knowledge dissemination. Journal of Industrial and Management Optimization, 2023, 19(6): 4199-4221. [12] An economic analysis of information security outsourcing with competitive firms. Managerial and Decision Economics, 2022, 43(7): 2748-2758. [13] An economic analysis of information security decisions with mandatory security standards in resource sharing environments. Expert Systems with Applications, 2022, 206: 117894. [14] Open source or closed source? A competitive analysis with software security. Decision Analysis, 2020, 17(1): 56-73. [15] A differential game approach to security investment and information sharing in a competitive environment. IIE Transactions, 2016, 48(6): 511-526. [16] Economic incentives in security information sharing: the effects of market structures. Information Technology and Management, 2016, 17(4): 361-377. [17] Should sophisticated expectations facilitate reaching equilibrium behavior? Operations Research Letters, 2016, 44(6): 812-817. [18] Information security investment for competitive firms with hacker behavior and security requirements. Annals of Operations Research, 2015, 235(1): 277-300. [19] Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers, 2015, 17(2): 423-438. [20] A game-theoretic analysis of information sharing and security investment for complementary firms. Journal of the Operational Research Society, 2014, 65(11): 1682-1691. [21] Information security investment when hackers disseminate knowledge. Decision Analysis, 2013, 10(4): 352-368. [22] A game-theory approach to configuration of detection software with decision errors. Reliability Engineering & System Safety, 2013, 119: 35-43. [23] A differential game approach to information security investment under hackers’ knowledge dissemination. Operations Research Letters, 2013, 41(5): 421-425. [24] Stochastic evolutionary game dynamics and their selection mechanisms. Computational Economics, 2013, 41(2): 233-247. [25] On local stability of Cournot models with simultaneous and sequential decisions. Mathematical Social Sciences, 2012, 63(3): 207-212. 其他作者 [26] Managing consumer privacy risk: The effects of privacy breach insurance. Electronic Commerce Research, 2023, 23(2): 807-841. [27] Agency or wholesale? retail selling format in the presence of new manufacturer introduction. Electronic Commerce Research, 2023, 23(4): 2291-2325. [28] Stay positive or go negative? Memory imperfections and messaging strategy. International Journal of Research in Marketing, 2022, 39(4): 1127-1149. [29] Does local monopolistic approximation imply a less stable equilibrium? Operations Research Letters, 2018, 46(5): 510-513. [30] Service competition in an online duopoly market. Omega, 2018, 77: 58-72. [31] Online retailer recommender systems: a competitive analysis. International Journal of Production Research, 2017, 55(14): 4089- 4109. [32] Stochastic evolutionary selection in heterogeneous populations for asymmetric games. Computational Economics, 2015, 45(3): 501-515. 招生信息 欢迎数理和英语基础较强、对科研兴趣浓厚的管理类相关专业学生报考硕士或博士研究生。 |